11.07.2015 Views

Security Protocols I - Information Security

Security Protocols I - Information Security

Security Protocols I - Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sebastian Mödersheim 1. A, B12Building a key establishment protocol (6)• Problem with this protocol?AS2. K AB 3. K AB , AThe session key K AB must be transported to A and B but to noother parties.• A realistic assumption in typical communication systems such asthe Internet and corporate networks:<strong>Security</strong> Assumption 1: the intruder is able to eavesdrop onall messages sent in a security protocol.⇒ Use a cryptographic algorithm and associated keys. BFMSEC Module 2, v.2 28.09.2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!